Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation
Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the sensor reports with fraud ones may cause the instability of the whole power grid or even result in a large area blackout. In this paper, a trusti...
Saved in:
Published in | arXiv.org |
---|---|
Main Authors | , , |
Format | Paper Journal Article |
Language | English |
Published |
Ithaca
Cornell University Library, arXiv.org
19.10.2010
|
Subjects | |
Online Access | Get full text |
ISSN | 2331-8422 |
DOI | 10.48550/arxiv.1010.3956 |
Cover
Abstract | Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the sensor reports with fraud ones may cause the instability of the whole power grid or even result in a large area blackout. In this paper, a trustiness system is introduced to the controller, who computes the trustiness of different sensors by comparing its prediction, obtained from Kalman filtering, on the system state with the reports from sensor. The trustiness mechanism is discussed and analyzed for the Linear Quadratic Regulation (LQR) controller. Numerical simulations show that the trustiness system can effectively combat the cyber attacks to smart grid. |
---|---|
AbstractList | Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the sensor reports with fraud ones may cause the instability of the whole power grid or even result in a large area blackout. In this paper, a trustiness system is introduced to the controller, who computes the trustiness of different sensors by comparing its prediction, obtained from Kalman filtering, on the system state with the reports from sensor. The trustiness mechanism is discussed and analyzed for the Linear Quadratic Regulation (LQR) controller. Numerical simulations show that the trustiness system can effectively combat the cyber attacks to smart grid. Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the sensor reports with fraud ones may cause the instability of the whole power grid or even result in a large area blackout. In this paper, a trustiness system is introduced to the controller, who computes the trustiness of different sensors by comparing its prediction, obtained from Kalman filtering, on the system state with the reports from sensor. The trustiness mechanism is discussed and analyzed for the Linear Quadratic Regulation (LQR) controller. Numerical simulations show that the trustiness system can effectively combat the cyber attacks to smart grid. |
Author | Lai, Lifeng Djouadi, Seddik M Li, Husheng |
Author_xml | – sequence: 1 givenname: Husheng surname: Li fullname: Li, Husheng – sequence: 2 givenname: Lifeng surname: Lai fullname: Lai, Lifeng – sequence: 3 givenname: Seddik surname: Djouadi middlename: M fullname: Djouadi, Seddik M |
BackLink | https://doi.org/10.48550/arXiv.1010.3956$$DView paper in arXiv https://doi.org/10.1109/icc.2011.5962594$$DView published paper (Access to full text may be restricted) |
BookMark | eNotkMFLwzAYxYMoOOfuniTguTNf0rTJUco2haHgehRKmqbSuSU1aaf-92bO04PH48d77wqdW2cNQjdA5qngnNwr_90d5kCiwSTPztCEMgaJSCm9RLMQtoQQmuWUczZBb4Xb12ro7Dteql0w-NX0zg8Bt87jjdGjN_jZDF_Of5gGF84O3u1wZ_Fmr_yAV75r8KFTuPRjiBQTAl4c1G6MSGev0UV7hM7-dYrK5aIsHpP1y-qpeFgnigMkjYCayrRuucikkRIyrWsKRDANVICumSTQ0hxYq7lpqKwFsFxoahhtVMvZFN2esH_Lq953sdtPdXygOj4QA3enQO_d52jCUG3d6G2sVFEiiMyBRPovyAdf2w |
ContentType | Paper Journal Article |
Copyright | 2010. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. http://arxiv.org/licenses/nonexclusive-distrib/1.0 |
Copyright_xml | – notice: 2010. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: http://arxiv.org/licenses/nonexclusive-distrib/1.0 |
DBID | 8FE 8FG ABJCF ABUWG AFKRA AZQEC BENPR BGLVJ CCPQU DWQXO HCIFZ L6V M7S PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS AKY GOX |
DOI | 10.48550/arxiv.1010.3956 |
DatabaseName | ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest Technology Collection ProQuest One Community College ProQuest Central Korea SciTech Premium Collection ProQuest Engineering Collection Engineering Database Proquest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering collection arXiv Computer Science arXiv.org |
DatabaseTitle | Publicly Available Content Database Engineering Database Technology Collection ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest One Academic UKI Edition ProQuest Central Korea Materials Science & Engineering Collection ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) Engineering Collection |
DatabaseTitleList | Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: GOX name: arXiv.org url: http://arxiv.org/find sourceTypes: Open Access Repository – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Physics |
EISSN | 2331-8422 |
ExternalDocumentID | 1010_3956 |
Genre | Working Paper/Pre-Print |
GroupedDBID | 8FE 8FG ABJCF ABUWG AFKRA ALMA_UNASSIGNED_HOLDINGS AZQEC BENPR BGLVJ CCPQU DWQXO FRJ HCIFZ L6V M7S M~E PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS AKY GOX |
ID | FETCH-LOGICAL-a511-d81b294bf5869e9916ccb21083c1281cb3901f2713fc5ed29b81378c2e32daf53 |
IEDL.DBID | BENPR |
IngestDate | Tue Jul 22 21:56:08 EDT 2025 Mon Jun 30 09:39:08 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-a511-d81b294bf5869e9916ccb21083c1281cb3901f2713fc5ed29b81378c2e32daf53 |
Notes | SourceType-Working Papers-1 ObjectType-Working Paper/Pre-Print-1 content type line 50 |
OpenAccessLink | https://www.proquest.com/docview/2080971071?pq-origsite=%requestingapplication%&accountid=15518 |
PQID | 2080971071 |
PQPubID | 2050157 |
ParticipantIDs | arxiv_primary_1010_3956 proquest_journals_2080971071 |
PublicationCentury | 2000 |
PublicationDate | 20101019 2010-10-19 |
PublicationDateYYYYMMDD | 2010-10-19 |
PublicationDate_xml | – month: 10 year: 2010 text: 20101019 day: 19 |
PublicationDecade | 2010 |
PublicationPlace | Ithaca |
PublicationPlace_xml | – name: Ithaca |
PublicationTitle | arXiv.org |
PublicationYear | 2010 |
Publisher | Cornell University Library, arXiv.org |
Publisher_xml | – name: Cornell University Library, arXiv.org |
SSID | ssj0002672553 |
Score | 1.4472094 |
SecondaryResourceType | preprint |
Snippet | Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the... Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the... |
SourceID | arxiv proquest |
SourceType | Open Access Repository Aggregation Database |
SubjectTerms | Blackout Computer Science - Cryptography and Security Computer Science - Systems and Control Computer simulation Controllers Cybersecurity Fraud Kalman filters Linear quadratic regulator Smart grid Stability |
SummonAdditionalLinks | – databaseName: arXiv.org dbid: GOX link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwdZ3NS8MwFMAf205eRPFrOjUHr4U1TZb0KGMfCM6DE3YQSj6hB6tsc_jn-5J0u4jQU0lyeK9Nfu8zAA9UGuZsKPvlXGRMOpap3KuMMlswrkRuo7_jeTGav7GnFV914H5fC6PWP_Uu9QfW4c6RYFUiwnehS2mwrWYvqxRsjJ242uGHYUiY8c2fjTWeFtMTOG4xjzwmvZxCxzVn8I4_n1Yhz5hMUeuOJPrdEARHEh3fjixSWrazZJySyEndkNcPVDCZrWtLdrUiy1AnEdPVyeTQrPscltPJcjzP2tsNMoWQk1nkRVoy7bkclS5QmjEa7S9ZmBDcMjo4IzxFG9Ib7iwttcwLIQ11BbXK8-ICes1n466AiCGXVgiBSwrmvZZDG8JrRSmLfIQT-3AZpVJ9pQYWIa1rWAV59WGwl1PVfrubiiJElggeIr_-d-INHMUwenjKAfS26293i6fzVt9FHf0CHRSOqQ priority: 102 providerName: Cornell University |
Title | Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation |
URI | https://www.proquest.com/docview/2080971071 https://arxiv.org/abs/1010.3956 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3NS8MwFA9zRfDmt9M5cvBa3JJmSQ8iOPaBsDp0wg7CSJMUenCb2xye_Nt9L-3mQRBKoS0t4eX1ff7ee4TcMGUiZ7HsVwgZRspFoW5lOmSR5ZHQsmV9vGOYtAev0eNETCok2dbCIKxyKxO9oLZzgzFycNIVtjsCjXi_-AhxahRmV7cjNHQ5WsHe-RZjeyQAkayA74OHbjJ63kVdWFvConiRr_TNvG718ivfoBML_muMc6wDf-ePbPYKp3dIgpFeuOURqbjZMdn3OE2zOiFv8P-mGqHKtAeM42hhQK8o2J7Ux84dTQpkt7O0U-DQaT6jL-_AI7S_zC3d5JqOsdTCI95pd9fv-5SMe91xZxCWAxJCDXZSaMHkZHGUZkK1Y4eGnjEpuHCKG8yPmRTjGRkDNzQzwlkWp6rFpTLMcWZ1JvgZqc7mM3dBqGwKZaWU8EkZZVmqmhYzdDxWvNWGF2vk3FNluih6YCAyrDlFetVIfUunacn-q-nvZl3-__iKHPh0PB5xnVTXy093DVp-nTbInur1G-UGwlX_aQLn4Xf3B7eKqWQ |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT8MwDLamTQhuvBkMyAGOFVuaLukBITE2Nh4TgiFxQKrSJJV2YIyN54_jv2GnHRyQuCH11Ko9OK792f5sA-xxZYSz1PYbRTIQyolANzIdcGFDEWnZsD7fcdlvdm_F2V10V4LPWS8M0SpnNtEbavtoKEeOQbqicUfoEY_GTwFtjaLq6myFhi5WK9hDP2KsaOw4dx9vGMJND3sneN77nHfag1Y3KLYMBBrBRmARt_FYpFmkmrEjtGRMinGQCg0VmUxKSYGMYyyXmchZHqeqEUpluAu51RktjUAPUBHU4FqGynG7f3X9neThTYkyCPPyqJ8ddqAn78NXipkxXI5pbXbF3_nlCrx_6yxC5UqP3WQJSm60DHOeFmqmK3CP5iLVxIxmHdRTx3K8PmUIdZlP1TvWz4nkzrJWTntnwxG7eUCVZKeToWWvQ80G1NnhCfas_T1efBUG_yGpNSiPHkduA5isR8pKKfGTUmRZquqWCoJhrMJGE1-swrqXSjLOR24QEa2ekLyqUJvJKSn-tmnyoxubfz_ehfnu4PIiuej1z7dgwTMB6IprUH6evLhtBBjP6U5xjAySf1acLxsY4T8 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Combating+False+Reports+for+Secure+Networked+Control+in+Smart+Grid+via+Trustiness+Evaluation&rft.jtitle=arXiv.org&rft.au=Li%2C+Husheng&rft.au=Lai%2C+Lifeng&rft.au=Djouadi%2C+Seddik+M&rft.date=2010-10-19&rft.pub=Cornell+University+Library%2C+arXiv.org&rft.eissn=2331-8422&rft_id=info:doi/10.48550%2Farxiv.1010.3956 |